ISYS 209 exam 2
As explained in this video, an inventory management program is an example of _____.
application software
A ________ is represented by a 0 or 1. Eight together make a byte (i.e., 00101100).
bit
Which operating system does the iPad use?
iOS
A server dedicated to managing HTML pages is called a(n):
web server
____________________ involves determining who is responsible for actions taken.
Accountability
Which of the following statements is FALSE about business intelligence (BI) systems?
BI systems only support decision-making activities.
Which of the following involves searching for patterns and relationships among data?
Data mining
Which of the following is NOT a function of a data warehouse?
Filter data
_______________ databases are by far the most popular type of database on the market today.
Relational
The most popular data manipulation language and method to "question" a database is called ______________.
Structured Query Language
Why are legacy systems still used?
They are too expensive to redesign.
According to this video, Linux is an example of _____.
open-source software
This video describes how advertisers use _____ in order to display more relevant ads based on a user's search and browsing history.
behavioral tracking
A store printing out receipts based on your buying patterns is related to the trend, ___________, where technology trends raise ethical issues.
data analysis advances
A ________ is a large-capacity, high-performance computer that can process large amounts of data very rapidly.
mainframe
In a student database, a column called LastName would be an example of a(n) _____________.
attribute
Copyright is protected throughout the life of the author plus an additional ______ years after the author's death.
70
Which of the following is FALSE about techno stress? - answer D)
A)It causes elevated levels of drug and alcohol abuse. B)It is induced by computer use. C)It is related to high levels of job turnover in the computer industry. D) Affected people start to behave like computers, devoid of emotions. E)Its symptoms include aggravation, hostility toward humans, impatience, and fatigue.
Which of the following is FALSE about the U.S. CAN-SPAM Act of 2003? correct answer is C)
A. It mandates that recipients be offered a way to remove their names from email lists. B.It requires commercial email messages to display accurate subject lines. C.It outlaws unsolicited commercial messaging. D.It requires commercial email messages to identify the true senders. E.It prohibits the use of fake return addresses.
According to this video, the business benefits of behavioral tracking include _____.
A. identifying prospective customers for products or services B. delivering ads based on social media activity C. delivering ads based on demographic data D. delivering ads based on geo-location data ALL!
Which of the following is FALSE about the digital divide in the U.S.? correct answer is D
A.Wealthier and more educated people were far more likely to take advantage of newer technologies then people from less fortunate socioeconomic groups. B.It is based on how technology is being used between different socioeconomic groups. C.It could lead to a society of information haves and have-nots. D.It is based only on having fair access to digital technology. E.Schools in high poverty areas less likely to have computers for students.
Among the following statements, which one is NOT applicable to big data?
Big data can be processed with traditional techniques.
Which of the following adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials?
Digital Millennium Copyright Act
According to Jack's explanation of the structure of relational database tables, which of the following statements about columns and rows is true?
Each row is a unique record for one of the items in the table and each column is an attribute of the item.
Which of the following refers to the capability of a computer, product, or system to add additional features?
Expandability
United States privacy laws are largely based on the _________________ report.
Fair Information Practices
The ethical principle that calls for hypothetically walking in the other person's shoes before making a decision is called the ______________.
Golden Rule
Nearly 80 percent of the Internet searches conducted use ___________, which makes it the largest data repository in history.
Which government act was enacted in 1996 to protect your medical records?
HIPAA
_______________ is an upgrade to traditional HTML because it allows the addition of multimedia features (i.e., video) without cumbersome add-ons.
HTML5
Which of the following statements is NOT a characteristic of Hadoop?
Hadoop extracts data from multiple tables that have a relationship.
Hitachi's new wearable device that can track office temperature, interactions, and even movements around the office is called the:
Hitachi Business Microscope (HBM).
What is the first step you should take in managing data for a firm?
Identify the data needed to run the business.
Which is the BEST description of intellectual property?
Intangible property created by individuals or corporations
____________________ involves examining laws on the books that provide individuals and companies the opportunity to recover damages caused by others.
Liability
Which of the following is an example of a popular open source operating system?
Linux
Which is NOT a way in which NORA technology can create a detailed dossier of a person?
Medical records
According to the information presented in this video, which of the following is not an operating system software?
Microsoft Office
If you needed a DBMS for large commercial use on a mainframe, _____________ would be a viable option.
Microsoft SQL Server
Which tool enables users to view the same data in different ways using multiple dimensions?
OLAP
Where is a cookie that is created during a Web site visit stored?
On the visitor's computer
Which type of software is created and updated by a worldwide community of programmers and is available for free?
Open source
Major products including Bluemix and Salesforce.com's Force.com are considered a:
Platform as a Service (PaaS).
Which U.S. act restricts the information the federal government can collect and regulates what it can do with the information?
Privacy Act of 1974
Among the following, what is the best way to distinguish between reporting tools and data mining tools?
The complexity of techniques used
Which is TRUE of a multi-tiered network?
The work of the entire network is balanced over several levels of servers.
One of the characters in this video asks the question: "Are there any laws to keep companies from installing trackers on my computer?" According to his colleague's reply, which of the following statements describes current U.S. law regarding the information Websites can collect and how that information is used?
The Children's Online Privacy Protection Act regulates the collection of personal information on children and bans behavioral advertising to children younger than 13 years of age without parental consent.
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?
Total cost of ownership (TCO)
The Federal Trade Commission Fair Information Practice principle of Notice/Awareness states that:
Websites must disclose their information practices before collecting data.
Which of the following is NOT a rule in an organization's information policy?
What the relationships inside the data are
According to the information presented in this video, a database management system (DBMS) is a software program for creating, processing, and _____ a database.
administering
___________ uniquely allows for presentation, communication, and storage of data. It is often used to transfer data from one organization to another.
XML
A ________ in a database represents a single character such as a letter or number.
byte
Microsoft Azure SQL is an example of a _________________ database.
cloud
Based on the information in this video, all of the activities listed here describe behavioral tracking except _____.
collecting credit card data from online purchases
As the two characters describe in this video, all of the following are a function of operating systems software except _____.
creating a presentation
A location specified to include IT infrastructure such as storage, security, and system backup is called a:
data center
Software such as Sequel Server 2014 which is used to manage business data (i.e., inventory) is an example of _______________ software.
data management
According to the information presented in this video, a spreadsheet is great to manage information about one thing (e.g., items for sale), but a _____ is preferred to manage information about more than one thing (e.g., items for sale and suppliers of items).
database
The special organizational function whose responsibilities include the technical and operational aspects of managing data, including physical database design and maintenance, is called ________.
database administration
In this video, Jack describes how metadata _____.
describe characteristics of each field
A common approach of networking multiple computers as opposed to a single computer is called:
distributed processing
In a student database, a collection of related attributes such as LastName, FirstName, and Student# creates a(n) _______________.
entity
A(n) __________ is a popular way to describe relationships (i.e., one-to-one, one-to-many) in a relational database.
entity relationship diagram
Principles of right and wrong that you use to make choices are called _____________.
ethics
Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called ________.
grid computing
According to this video, behavioral tracking and targeted ads can be seen as a double-edge sword because _____.
increases in targeted ads may result in higher sales but users may perceive them as a loss of privacy
If you want to collect data (i.e., photos) from someone and use the data, you must obtain _____________.
informed consent
As Jack explains to Kate, a database is a collection of _____ records.
integrated
A photo you have taken of your family is considered ______________, and is protected by law.
intellectual property
The most common use of nonrelational database management systems is for__________________.
managing extremely large data sets
The data _______________ language would allow you to retrieve information from the database (i.e., using the SELECT, FROM, WHERE commands).
manipulation
Software applications that are based on combining different online software applications are called:
mashups
Compared to in-house hosting, cloud-based hosting ________.
minimizes the risk of investing in technology that will soon become obsolete
Tracking your movements without consent is most related to the trend, ___________, where technology trends raise ethical issues.
mobile device growth impact
When thinking about downloading and using a photo off the Internet, don't forget the ethical __________ lunch rule.
no free
Relational tables need to be ______________ to help avoid duplicate data.
normalized
In cloud computing, resources are said to be "pooled" because:
organizations share the same physical hardware through virtualization.
A(n) __________ key uniquely identifies a row or record in a table.
primary
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of ________.
property rights and obligations
In a student database, a row that describes the top student, including his or her LastName, FirstName, and StudentNumber, is an example of a ______________.
record
Relational databases enforce ______________ integrity to ensure, for instance, that a teacher can't be assigned to a CLASS table unless they already exist in the TEACHER table.
referential
The Windows operating system is an example of ______________ software.
system
The ethical principle that calls ranking alternatives before making a decision is called the ______________.
utilitarian principle
AccuMed is a software package used by doctors to schedule patient appointments. According to the information presented in this video, AccuMed is _____.
vertical- market software
Configuring a server to run a variety of instances of an operating system to appear like many different machines to the end user is an example of:
virtualization
Developing effective apps is considered a critical element to successful adoption of:
wearable computing.
The Apple watch is a new type of mobile digital computing called:
wearable computing.
Another common name for a web beacon is a ____________, which tracks user activities.
web bug
Disney is using a/an ___________ technology in the form of a wristband to help improve the guest experience by combining a guest's room key, park ticket, and eventually a vacation-planning system to make the experience more efficient with reduced wait times.
radio-frequency identification (RFID)